The SSL certificate is the most objective indicator for identifying a genuine Binance website—spellings can be mimicked and pages can be cloned, but certificates cannot be forged. The main Binance website uses an Extended Validation (EV) certificate issued by DigiCert Inc, which includes "BINANCE HOLDINGS LIMITED" in the Subject field. Almost all phishing sites use free Let's Encrypt certificates and cannot pass EV certification. To quickly judge the authenticity of a domain, open the Binance Official Website and cross-reference the certificate fingerprints listed in this article. If you prefer not to perform technical verification, downloading the Binance Official App and using the in-app channels is the most worry-free option. This article provides both graphical browser and command-line verification methods, each of which can be completed within 20 seconds.
1. Basic Concepts of SSL Certificates
Three Verification Levels of Certificates
TLS/SSL certificates are divided into three levels based on the strictness of verification:
| Level | Abbreviation | Verification Content | Issuance Period | Typical Use |
|---|---|---|---|---|
| Domain Validation | DV | Only proves domain ownership | Minutes | Personal sites, small businesses |
| Organization Validation | OV | Domain + Business registration info | 3-5 days | Medium-sized enterprise sites |
| Extended Validation | EV | Domain + Legal entity real-name | 7-10 days | Financial/Large enterprise official sites |
The main Binance site and accounts.binance.com all use EV-level certificates. The application fee for an EV certificate is $200-$600 per year and requires a complete corporate audit + legal representative identity verification. Phishing sites will not pay this fee, making it a hard barrier.
Key Fields of a Certificate
- Subject: Information about the certificate holder, including CN (Common Name), O (Organization), and C (Country);
- Issuer: The CA (Certificate Authority) that issued the certificate;
- Valid From / To: The validity period of the certificate;
- Serial Number: The unique serial number of the certificate;
- Signature Algorithm: Usually sha256WithRSAEncryption or ecdsa-with-SHA384;
- SAN (Subject Alternative Name): A list of additional domains covered by the certificate.
2. Graphical Viewing Method via Browser
Chrome / Edge
- Visit
https://www.binance.com; - Click the 🔒 padlock icon on the far left of the address bar;
- Select "Connection is secure" in the popup;
- Click "Certificate is valid";
- Check the validity period and issued object in the "General" tab;
- Switch to the "Details" tab to see the Serial Number, fingerprints, and other full fields.
Firefox
- Click the 🔒 icon in the address bar;
- Click the arrow to the right of "Connection secure";
- Select "More Information";
- In the popup, go to the "Security" tab;
- Click "View Certificate" to enter the full field view.
Safari (macOS)
- Click the 🔒 icon in the address bar;
- Click "Show Certificate";
- Expand the triangle to view certificate details;
- You can export it as a .cer file for local saving.
Reference Certificate Fields for Genuine Binance (April 2026)
- Subject CN:
*.binance.com - Subject O:
Binance Holdings Limited - Subject C:
VG(British Virgin Islands) - Issuer:
DigiCert TLS RSA SHA256 2020 CA1 - Valid Period: Usually a 13-month rolling renewal
- Key Length: 2048-bit RSA or 256-bit ECC
- SAN includes: binance.com, *.binance.com, accounts.binance.com, etc.
Seeing "Binance Holdings Limited" in the Subject O field basically confirms it is the genuine site. Phishing sites absolutely cannot generate this field because EV certificates require business proof.
3. Command-Line Verification Methods
Method 1: openssl s_client
The most standard low-level tool. Command:
openssl s_client -connect www.binance.com:443 -servername www.binance.com -showcerts
The output contains the full certificate chain (Server Cert → Intermediate CA → Root CA). Look for these key fields:
subject=C = VG, O = Binance Holdings Limited, CN = *.binance.com
issuer=C = US, O = DigiCert Inc, CN = DigiCert TLS RSA SHA256 2020 CA1
Method 2: Querying Validity Period
openssl s_client -connect www.binance.com:443 -servername www.binance.com < /dev/null 2>/dev/null \
| openssl x509 -noout -dates
Example output:
notBefore=Apr 10 00:00:00 2025 GMT
notAfter=Apr 15 23:59:59 2026 GMT
If the notAfter date has passed or the validity period is within 90 days, it is likely a phishing site (a hallmark of Let's Encrypt certificates).
Method 3: Calculating Certificate Fingerprint
The SHA-256 fingerprint is the unique identifier for a certificate; any change in the certificate content will change the fingerprint:
openssl s_client -connect www.binance.com:443 -servername www.binance.com < /dev/null 2>/dev/null \
| openssl x509 -noout -fingerprint -sha256
Output:
sha256 Fingerprint=XX:XX:XX:...:XX
Compare this fingerprint with the official one published on the Binance Official Website page. If they match, it is the genuine site.
Method 4: Parsing the SAN List
openssl s_client -connect www.binance.com:443 -servername www.binance.com < /dev/null 2>/dev/null \
| openssl x509 -noout -text \
| grep -A 1 "Subject Alternative Name"
The SAN will list all subdomains covered by the certificate. A genuine Binance certificate contains dozens of Binance-related domains, whereas phishing sites usually only list their own domain.
4. Certificate Transparency (CT) Log Verification
What is a CT Log?
Certificate Transparency is a public auditing mechanism promoted by Google. All publicly trusted CAs must submit records to CT logs when issuing certificates. Users can query all historical certificates for any domain.
Querying Method
Visit crt.sh: https://crt.sh/?q=binance.com
The results page shows all historical certificates for binance.com, including:
- Certificate Serial Number
- Issuance Date
- Expiration Date
- Issuing CA
- SAN list
How to Detect Phishing Sites Using CT Logs
- Query the phishing site domain (e.g.,
crt.sh/?q=bineance.com); - Look at the number of certificate issuance records—genuine Binance has hundreds, while phishing sites usually have 1-2;
- Look at the issuance time—genuine Binance has continuous records since 2017, while phishing sites often only appear within the last 30-90 days;
- Look at the CA—genuine Binance primarily uses DigiCert, whereas phishing sites mostly use Let's Encrypt.
CT logs are unerasable public records and are the most authoritative way to judge a domain's history.
5. OCSP and Revocation Checks
OCSP Response
The Online Certificate Status Protocol is used to query whether a certificate has been revoked. Browsers perform OCSP checks by default, although they don't always succeed.
Command-line query:
openssl ocsp -issuer /path/to/issuer.crt -cert /path/to/cert.crt \
-url http://ocsp.digicert.com
CRL Revocation List
Some CAs publish CRL (Certificate Revocation List) files. You can download them and search for the serial number of the target certificate.
Most users do not need to perform active OCSP checks; browsers handle this automatically. The important thing is not seeing a certificate warning in the browser.
6. Certificate Chain Integrity Verification
What is a Certificate Chain?
The browser trust chain:
Root CA Certificate (DigiCert Global Root CA, pre-installed in the OS)
↓
Intermediate CA Certificate (DigiCert TLS RSA SHA256 2020 CA1)
↓
Server Certificate (*.binance.com)
If any layer is missing or the signature does not match, the browser will display "NET::ERR_CERT_AUTHORITY_INVALID".
Chain Integrity Check
openssl s_client -connect www.binance.com:443 -servername www.binance.com < /dev/null 2>/dev/null \
| openssl verify -untrusted /path/to/intermediate.crt
Or use online tools like ssllabs.com/ssltest/ to get a comprehensive A+ rating for the domain. The rating for the main Binance site on SSL Labs is consistently A or A+.
7. Complete Verification Checklist (20 Seconds)
Quick Version (3 Browser Steps)
- Visit the target domain;
- Click the 🔒 icon to view the certificate;
- Confirm Subject O = "Binance Holdings Limited" and that the Issuer includes DigiCert;
If all three are correct → Genuine site; if any do not match → High probability of being a fake.
Deep Version (7 Command-Line Steps)
DOMAIN=www.binance.com
echo "1. DNS Resolution"
dig +short $DOMAIN
echo "2. TLS Connection"
curl -I --connect-timeout 5 https://$DOMAIN
echo "3. Certificate Subject"
openssl s_client -connect $DOMAIN:443 -servername $DOMAIN < /dev/null 2>/dev/null \
| openssl x509 -noout -subject
echo "4. Certificate Issuer"
openssl s_client -connect $DOMAIN:443 -servername $DOMAIN < /dev/null 2>/dev/null \
| openssl x509 -noout -issuer
echo "5. Validity Period"
openssl s_client -connect $DOMAIN:443 -servername $DOMAIN < /dev/null 2>/dev/null \
| openssl x509 -noout -dates
echo "6. Fingerprint"
openssl s_client -connect $DOMAIN:443 -servername $DOMAIN < /dev/null 2>/dev/null \
| openssl x509 -noout -fingerprint -sha256
echo "7. CT Log Query"
curl -s "https://crt.sh/?q=$DOMAIN&output=json" | head -1
Save this script as verify-binance.sh and run bash verify-binance.sh for a one-click full check.
8. Common Certificate Anomalies and Judgments
Anomaly 1: Let's Encrypt Certificate
- Appearance: Issuer is "R3" or "R10";
- Judgment: The main Binance site never uses Let's Encrypt;
- Exception: Some regional low-traffic mirrors might use them temporarily, but official entry domains will not.
Anomaly 2: Self-Signed Certificate
- Appearance: Browser displays "NET::ERR_CERT_AUTHORITY_INVALID";
- Judgment: 100% phishing site or MITM (Man-in-the-Middle) attack;
- Action: Immediately close the tab and do not click "Proceed anyway."
Anomaly 3: Expired Certificate
- Appearance: Browser displays "NET::ERR_CERT_DATE_INVALID";
- Judgment: Could be a genuine Binance site with an operational error (rare), or your local system time is incorrect;
- Action: Check your system time; if it's correct and the certificate is expired, it's likely a fake.
Anomaly 4: Certificate Includes Extra Domains
- Appearance: SAN contains other websites besides Binance;
- Judgment: Some free certificates merge multiple customer domains, or it could be a shared CDN misconfiguration;
- Action: Check if Subject O is "Binance Holdings Limited"; if not, do not trust it.
Anomaly 5: DNS Resolves to Private IP
- Appearance:
nslookupreturns 192.168.x.x / 10.x.x.x / 127.0.0.1; - Judgment: DNS hijacking or hosts file tampering;
- Action: Check your hosts file (Windows:
C:\Windows\System32\drivers\etc\hosts; macOS/Linux:/etc/hosts) and delete suspicious entries.
9. Certificate Pinning Configuration
What is Certificate Pinning?
Pinning hard-codes the fingerprint of a specific certificate in the client. Even if an attacker holds a "legitimate" certificate issued by a trusted CA, it will be rejected.
HPKP is Deprecated
HTTP Public Key Pinning (HPKP) was deprecated in Chrome 72 (2019) due to the risk of websites becoming permanently inaccessible after configuration errors. Modern browsers no longer support it.
Application-Level Pinning
Pinning can be implemented inside iOS / Android apps:
- iOS: Use the TrustKit library to pin certificates;
- Android: Configure
<pin>in the Network Security Config XML; - Electron (Mac/Win): Verify in
app.on('certificate-error').
The official Binance app implements pinning internally, so even if your device is under a MITM attack, the app will not trust a fake certificate. This is one of the key reasons why the App channel is more secure than the browser.
Certificate Injection in Enterprise Environments
Enterprise networks might inject their own Root CA via AD policies for traffic decryption and auditing. In this case, the browser-displayed Issuer will be the enterprise CA instead of DigiCert. If accessing Binance from a work environment, it's recommended to use your personal phone's mobile network to prevent credentials from being logged.
10. Certificate Saving and Backup
Exporting Certificates
Chrome: Certificate popup → Details → Export → Save as .cer or .pem file.
Firefox: Directly supports PEM text viewing and copying.
Command-line:
openssl s_client -connect www.binance.com:443 -servername www.binance.com < /dev/null 2>/dev/null \
| openssl x509 > binance-cert-2026.pem
Significance of Backup
- Future Comparison: If the Binance certificate is updated, you can compare historical fingerprints to confirm it's a normal renewal rather than a hijacking;
- Emergency Query: Certificates are usually valid for 13 months and are renewed a week before expiration;
- Evidence Preservation: If you encounter a phishing attack, preserving evidence can help in post-incident investigations.
FAQ
Q1: Why do some Binance mirrors use certificates other than DigiCert?
A: Some mirrors (e.g., binance.info, binance.bz) use Cloudflare CDN, and the certificates are issued by Cloudflare Inc. This is normal. The key is to ensure the Subject CN contains "binance" and the issuer is Cloudflare Inc (not Let's Encrypt). Visit the Binance Official Website for a live list of official mirrors.
Q2: How often does the certificate fingerprint change?
A: It changes with every renewal. DigiCert EV certificates are typically renewed every 13 months, generating a new fingerprint each time. You shouldn't hard-code the fingerprint in your scripts; instead, sync with the latest one periodically. This site updates the latest fingerprint in the homepage announcements after each renewal.
Q3: What should I do if my browser says the certificate is not secure?
A: There are three reasons: (1) The certificate itself is problematic (phishing); (2) Your system time is wrong (sync it automatically); (3) An enterprise proxy is intercepting (use a personal network). After ruling out 2 and 3, if the warning persists, it is almost certainly a phishing site.
Q4: Does the mobile app display certificate information?
A: No. The app uses an internal certificate pinning mechanism and does not expose certificate details. However, the app's trust mechanism is stricter than a browser's—if the certificate is abnormal, it will disconnect immediately without giving you a "Proceed anyway" option.
Q5: Why is an EV certificate important?
A: EV certificates require a business real-name audit by the CA, which takes 7-10 days. Phishing sites cannot use their real company info to apply (they would be sued), and using fake data will not pass the CA audit. Thus, "Subject O = Binance Holdings Limited" is an unforgeable marker.
Want to learn more about Binance's security mechanisms? Visit 5 Key Features for Identifying Binance Phishing Sites. Return to Category Navigation or browse All Tutorials.